標題: Titlebook: International Conference on Innovative Computing and Communications; Proceedings of ICICC Aboul Ella Hassanien,Oscar Castillo,Ajay Jaiswal [打印本頁] 作者: TEMPO 時間: 2025-3-21 18:17
書目名稱International Conference on Innovative Computing and Communications影響因子(影響力)
書目名稱International Conference on Innovative Computing and Communications影響因子(影響力)學科排名
書目名稱International Conference on Innovative Computing and Communications網(wǎng)絡公開度
書目名稱International Conference on Innovative Computing and Communications網(wǎng)絡公開度學科排名
書目名稱International Conference on Innovative Computing and Communications被引頻次
書目名稱International Conference on Innovative Computing and Communications被引頻次學科排名
書目名稱International Conference on Innovative Computing and Communications年度引用
書目名稱International Conference on Innovative Computing and Communications年度引用學科排名
書目名稱International Conference on Innovative Computing and Communications讀者反饋
書目名稱International Conference on Innovative Computing and Communications讀者反饋學科排名
作者: MEAN 時間: 2025-3-21 23:27
the limb is also a highly visible target for toxicology studies. In addition, the developing limb bud has been used extensively as a source of cells to study issues concerning cellular differentiation, the control of cell proliferation, and the production of morphogenetic signals; thus the behavior 作者: antipsychotic 時間: 2025-3-22 00:47 作者: Musket 時間: 2025-3-22 05:51
F. H. A. Shibly,Uzzal Sharma,H. M. M. Naleers of metabolismwhich must be considered when evaluating putative mechanisms by which these alcohols might produce dysmorphogenesisfollowing maternal exposure; aspects of the pharmacokinetics of ethanol and methanol relevant to evaluatinganimal models and mechanisms of action are presented. In this a作者: narcotic 時間: 2025-3-22 10:27 作者: 得罪人 時間: 2025-3-22 13:51
Azmi Shawkat Abdulbaqi. Prenatal exposure to TCDD adversely affects other developing systems, including the urogenital tract and the immune system, and a brief discussion of these topics will be presented. Reviews of reproductive and immunological responses are available in P. et al. (1993) and H. and L. (1994).作者: 襲擊 時間: 2025-3-22 18:31
Vaishali Suryawanshi,Tanuja Saroded PEPTs are responsible for the uptake of di-/tripeptides and peptide-like drugs. MATEs are responsible for efflux of organic cations. These transporters also transport some endogenous substances, indicating that the dysfunction of SLCs not only disrupts homeostasis but also largely impacts on the d作者: 過去分詞 時間: 2025-3-22 22:36
Energy Efficient Approach for Virtual Machine Placement Using Cuckoo Search,he SLA. Objective and .: To achieve and propose an effective solution for dynamic Virtual Machine Placement Problem considering initial allocation and reallocation. The primary focus is by employing meta-heuristic algorithm, and thereby obtaining the robust solution and achieving the associated QoS 作者: perpetual 時間: 2025-3-23 05:17
An Efficient Method for Detecting Hate Speech in Tamil Tweets Using an Ensemble Approach,ine and deep learning algorithms for this study namely. Support Vector Machine (SVM), Logistic Regression (LR), Na?ve Bayes (NB), Bidirectional LSTM, Multi-layer Perceptron (MLP) and Multilingual BERT. When it comes to detecting hate speech, SVM (82%) and LR (82%) have the best Accuracy. Furthermore作者: 無法取消 時間: 2025-3-23 06:39
Centralized RSU Deployment Strategy for Effective Communication in Multi-hop Vehicular Adhoc Networlation is carried out in NS2.35 and SUMO. The parameters which are taken for the performance analysis are packet delivery ratio, end to end delay, routing overhead and packet loss. In order to execute comparative analysis the recent research works are considered which are AVRCV and RDSTDV. From the 作者: Adornment 時間: 2025-3-23 10:41
An Intellectual Routing Protocol for Connectivity Aware Cross Layer Based VANETs,r approach is used to find the optimal path between the sources to the destination at the time of data transfer. In order to evaluate the performance of the proposed CLCAGRP, the parameters which are calculated in the simulation evaluation are packet delivery ratio, energy efficiency, network throug作者: Expediency 時間: 2025-3-23 14:38
An Analytical Survey of Image Encryption Techniques Used in Various Application Domains, various application domains such as finance, defense, remote sensing, medical, etc. The image encryption techniques reviewed in this paper are categorized based on chaotic map, DNA coding, neural network, and spatial techniques. These techniques are compared to assess those on the basis of various 作者: 強所 時間: 2025-3-23 21:14
Estimation Approaches of Machine Learning in Scrum Projects,and estimated amount of effort. A thorough literature analysis led to the conclusion that machine learning models outperformed traditional estimation methods and methods that did not incorporate machine learning.作者: correspondent 時間: 2025-3-23 23:51 作者: 短程旅游 時間: 2025-3-24 02:38 作者: MOAT 時間: 2025-3-24 07:29
Investigating the Role of Metaverse Technology-Facilitated Online Advertising in Purchase Decision- face-to-face, 3D experiences. Overall, the results indicated a significant role of metaverse technology in the Emirati consumer industry, facilitating the customers to make the most suitable decisions. Thus, it is concluded that technology entices customers who enjoy these exposures and make decisi作者: 不足的東西 時間: 2025-3-24 13:40
Performance Analysis of DCT Based Latent Space Image Data Augmentation Technique,set using VGG16 revealed that the proposed hybrid technique is more effective than the technique where the synthetic images are created solely from the DCT-based latent space. The analysis of training loss and validation loss shows significant improvement in validation loss, thus improving generaliz作者: Antarctic 時間: 2025-3-24 15:34 作者: 高爾夫 時間: 2025-3-24 20:36 作者: 干旱 時間: 2025-3-25 02:08 作者: 保守 時間: 2025-3-25 04:46 作者: 不能和解 時間: 2025-3-25 11:01 作者: 閑逛 時間: 2025-3-25 12:36
Punam Bedi,Ningyao Ningshen,Surbhi Rani,Pushkar Gole作者: 巨頭 時間: 2025-3-25 17:36 作者: 衍生 時間: 2025-3-25 20:46 作者: 薄荷醇 時間: 2025-3-26 01:52
Swati Jadhav,Rohit Patil,Saee Patil,Shweta Patil,Varun Patil作者: Adrenaline 時間: 2025-3-26 06:52 作者: ACRID 時間: 2025-3-26 11:02
A. Bharathi Malakreddy,D. Sri Lakshmi Priya,V. Madhumitha,Aryan Tiwari作者: 拱形面包 時間: 2025-3-26 14:13 作者: hereditary 時間: 2025-3-26 19:56
An Efficient Method for Detecting Hate Speech in Tamil Tweets Using an Ensemble Approach,llowing individuals to openly express their thoughts, behaviors, and opinions. Although this presents an excellent chance for racism, trolling, and exposure to a flood of nasty online content. As a result, social media’s exponential rise in hate speech is profoundly affecting society. In this study,作者: Foreknowledge 時間: 2025-3-26 23:07 作者: 虛弱 時間: 2025-3-27 01:45
A Secure Transmission of Encrypted Medical Data Based on Virtual Instruments,iagnose and monitor cardiac problems. Utilizing the myDAQ data acquisition device and LabVIEW, identifying cardiac illness in real-time is now not only possible but also simple. As a result, this article presents a system that can capture ECG signals in real-time, detect heart problems, and reveal w作者: LAPSE 時間: 2025-3-27 08:34 作者: insightful 時間: 2025-3-27 13:11 作者: 他日關稅重重 時間: 2025-3-27 17:19 作者: deficiency 時間: 2025-3-27 21:45
An Analytical Survey of Image Encryption Techniques Used in Various Application Domains,cal, etc. These images may encompass subtle and private data. Thus, images are mandatory to be secured from illegal access. Several image security methodologies have been developed in previous years. Most of the techniques to secure the images use encryption. In this method, an encrypted image is ge作者: bypass 時間: 2025-3-28 00:45
Estimation Approaches of Machine Learning in Scrum Projects,uld take. The introduction of Agile, (PBPM)principle-based process models, such as Scrum, brought about a substantial shift in the industry. This shift in culture proves to be extremely beneficial in terms of enhancing the collaboration that exists between the customer and the developer. In Agile de作者: cavity 時間: 2025-3-28 03:58 作者: 壟斷 時間: 2025-3-28 07:56 作者: 供過于求 時間: 2025-3-28 10:29 作者: Aviary 時間: 2025-3-28 14:45
Toward Developing Attention-Based End-To-End Automatic Speech Recognition,l Language Processing (NLP) is an innovative area of research and has become a popular topic for researchers. This paper aims to examine various Automatic Speech Recognition systems developed over the past decades. Antiquated ASR systems consist of acoustic model, language model, pronunciation model作者: 休息 時間: 2025-3-28 18:46 作者: 沒血色 時間: 2025-3-29 02:09
Advances Toward Word-Sense Disambiguation,n natural language processing. In this paper, we discuss various approaches used to tackle this problem. Research works conduced in recent years to solve this problem are also discussed with special focus on resource poor languages. Technological trends followed in the recent years are analyzed that作者: 惹人反感 時間: 2025-3-29 06:26 作者: 沉默 時間: 2025-3-29 10:50
Investigating the Role of Metaverse Technology-Facilitated Online Advertising in Purchase Decision-to provide greater accessibility and real-time, face-to-face experiences. This research also focused on metaverse technology, specifically in online advertising, further facilitating customer purchase decision-making. The researchers selected a sample of?.?=?384 individuals and employed structural e作者: Coronary 時間: 2025-3-29 11:23
Performance Analysis of DCT Based Latent Space Image Data Augmentation Technique,ity of data and poor generalization. The existing methods for image data augmentation are mainly domain specific and focus on transformations in spatial domain. In this paper, we have developed a domain independent image data augmentation technique based on frequency domain transformations. In this 作者: 凝視 時間: 2025-3-29 17:32
Text Summarisation Using BERT, from a text, is a significant research topic. Text summarisation may obtain concise and accurate information while maintaining the text’s original structure. The method for creating a succinct and accurate extraction summary for the provided text material is presented in this project. This paper pr作者: Organonitrile 時間: 2025-3-29 21:42 作者: 無所不知 時間: 2025-3-30 00:51
Loveleena Mukhija,Rohit Sachdeva,Amanpreet Kaurells have evolved many distinct stress responses, this chapter will focus on three major, highly conserved, response systems, i.e., the genotoxic response system, which is activated by DNA damage; the oxidative stress response system, which is activated by excess reactive oxygen species (ROS) and im作者: cajole 時間: 2025-3-30 04:34 作者: 招募 時間: 2025-3-30 08:58
Meenakshi Agarwal,Arvind,Ram Ratane asked ourselves what new approach could we offer that would capture the state of the science and bring a new synthesis of the information on this topic to the world‘s literature. We chose a three-pronged approach, centered around those particular drugs for which we have a relatively well establish作者: instulate 時間: 2025-3-30 12:42
Azmi Shawkat Abdulbaqizo-.-dioxins, dibenzofurans, and coplanar polychlorinated biphenyls (PCB). TCDD is developmental toxic, and in embryonic mice its teratogenicity is manifested as cleft palate and hydronephrosis. The relatively specific targeting of the developing secondary palate prompted intensive investigation spa作者: URN 時間: 2025-3-30 16:50 作者: 除草劑 時間: 2025-3-31 00:33
https://doi.org/10.1007/978-981-99-4071-4Innovative Communication Networks and Security; Innovative Computing; Internet of Things (IoT); Machine作者: 兇殘 時間: 2025-3-31 03:25 作者: 奴才 時間: 2025-3-31 05:09
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/i/image/471395.jpg作者: 預感 時間: 2025-3-31 11:10
978-981-99-4070-7The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor作者: 天然熱噴泉 時間: 2025-3-31 17:19
International Conference on Innovative Computing and Communications978-981-99-4071-4Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: Anthrp 時間: 2025-3-31 21:27 作者: Concrete 時間: 2025-4-1 01:23
,Sentiment Analysis of?Public Opinion Towards Reverse Diabetic Videos, not yet been much investigated based on YouTube video comment analysis. To categorise the dataset, the machine learning techniques like Naive Bayes, support vector machine, logistic regression, and random forest were utilised.作者: 種屬關系 時間: 2025-4-1 04:57 作者: 夸張 時間: 2025-4-1 06:56 作者: 痛恨 時間: 2025-4-1 11:41